Asserting The Security Restrictions Applicable To Images Posted By Users To Information Platforms

PENMATSA UDAYA BHANU, N.SHIVA KUMAR, Dr. M. SAMBASIVUDU

Abstract


It's becoming more difficult to maintain privacy in the age of social media, as seen by the recent rash of high-profile examples in which people have inadvertently released private information online. All of these incidents show why it's crucial to have user access management tools for freely available information. To address this requirement, we propose an Adaptive Privacy Policy Prediction (A3P) system that may provide users with guidance on how to organise their picture privacy settings. Here, we investigate if and how a user's privacy preferences may be revealed via their social network settings, image content, and metadata. Our two-tiered method takes into account the user's prior activity on the site to determine the most fitting privacy options for their future picture uploads. Our method employs a policy prediction algorithm to automatically build a policy for each newly submitted image, taking into consideration users' social qualities, and an image classification framework to find groups of photos that may be associated by similar rules. Rulemaking will evolve over time to accommodate shifting public attitudes towards personal data privacy. We provide the results of a large-scale analysis of more than 6,000 policies, demonstrating that our method achieves prediction accuracy of 93% or better.


References


A. Acquisti and R. Gross, “Imagined communities: Awareness, information sharing, and privacy on the facebook,” in Proc. 6th Int. Conf. Privacy Enhancing Technol. Workshop, 2006, pp. 36–58.

R. Agrawal and R. Srikant,“Fast algorithms for mining association rules in large databases,” in Proc. 20th Int. Conf. Very Large Data Bases, 1994, pp. 487–499.

S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, “Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 357–366.

M. Ames and M. Naaman, “Why we tag: Motivations for annotation in mobile and online media,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 971–980.

A. Besmer and H. Lipford, “Tagged photos: Concerns, perceptions, and protections,” in Proc. 27th Int. Conf. Extended Abstracts Human Factors Comput. Syst., 2009, pp. 4585–4590.

D. G. Altman and J. M. Bland ,“Multiple significance tests: The bonferroni method,” Brit. Med. J., vol. 310, no. 6973, 1995.

J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable Privacy Security, 2009.

J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,” in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining., 2009, pp.249–254.

H.-M. Chen, M.-H. Chang, P.-C. Chang, M.-C. Tien, W. H. Hsu, and J.-L. Wu, “Sheepdog: Group and tag recommendation for flickr photos by automatic search-based learning,” in Proc. 16th ACM Int. Conf. Multimedia, 2008, pp. 737–740.

M. D. Choudhury, H. Sundaram, Y.-R. Lin, A. John, and D. D. Seligmann, “Connecting content to community in social media via image content, user tags and user communication,” in Proc. IEEE Int. Conf. Multimedia Expo, 2009, pp.1238–1241.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.